search for: xsh

Displaying 20 results from an estimated 65 matches for "xsh".

Did you mean: sh
2010 Sep 02
7
[PATCH] libxl: make libxl communicate with xenstored by socket or xenbus driver
...------- diff -r eff592364826 tools/libxl/libxl.c --- a/tools/libxl/libxl.c Wed Sep 01 11:23:49 2010 +0100 +++ b/tools/libxl/libxl.c Thu Sep 02 14:51:46 2010 +0100 @@ -1387,10 +1387,8 @@ { libxl_device_model_starting *starting = for_spawn; char *kvs[3]; - int rc; struct xs_handle *xsh; - xsh = xs_daemon_open(); /* we mustn''t use the parent''s handle in the child */ kvs[0] = "image/device-model-pid"; @@ -1398,9 +1396,10 @@ return; kvs[2] = NULL; - rc = xs_writev(xsh, XBT_NULL, starting->dom_path, kvs); - if (rc)...
2010 Aug 13
0
[PATCH 1 of 4] libxl_device_generic_add: handle NULL fents or bents
...lini <stefano.stabellini@eu.citrix.com> diff -r 85bd0f6e8fed tools/libxl/libxl_device.c --- a/tools/libxl/libxl_device.c Fri Aug 13 13:55:51 2010 +0100 +++ b/tools/libxl/libxl_device.c Fri Aug 13 19:23:05 2010 +0100 @@ -76,21 +76,21 @@ retry_transaction: t = xs_transaction_start(ctx->xsh); /* FIXME: read frontend_path and check state before removing stuff */ - xs_rm(ctx->xsh, t, frontend_path); - xs_rm(ctx->xsh, t, backend_path); + if (fents) { + xs_rm(ctx->xsh, t, frontend_path); + xs_mkdir(ctx->xsh, t, frontend_path); + xs_set_perm...
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer address in xenstore across save/restore and migrate, and also code to increment the value in all cases except for migration. Patch 1 modifies the guest ro and rw node creation to an open coding style and cleans up some extraneous node creation. Patch 2 modifies creation of the hvmloader key in xenstore and adds
2011 Mar 30
2
[PATCH] xenstore-stat v2
..." : ""; errx(1, "Usage: %s %s[-h] [-n NR] key", progname, mstr); + case MODE_stat: + mstr = incl_mode ? "stat " : ""; + errx(1, "Usage: %s %s[-h] [-s] key [...]", progname, mstr); } } @@ -286,6 +290,52 @@ do_watch(struct xs_handle *xsh, int max_events) } } +static const char * +perm_type_str(int perm_type) +{ + switch (perm_type) { + case XS_PERM_WRITE: + return "-w"; + case XS_PERM_READ: + return "r-"; + case XS_PERM_READ|XS_PERM_WRITE: + return "rw"; + cas...
2007 Oct 24
16
PATCH 0/10: Merge PV framebuffer & console into QEMU
The following series of 10 patches is a merge of the xenfb and xenconsoled functionality into the qemu-dm code. The general approach taken is to have qemu-dm provide two machine types - one for xen paravirt, the other for fullyvirt. For compatability the later is the default. The goals overall are to kill LibVNCServer, remove alot of code duplication and/or parallel impls of the same concepts, and
2006 Aug 02
0
[PATCH] xenstore-chmod
...if defined(CLIENT_exists) || defined(CLIENT_list) errx(1, "Usage: %s [-h] [-s] key [...]", progname); +#elif defined(CLIENT_chmod) + errx(1, "Usage: %s [-h] [-s] key <mode [modes...]>", progname); #endif } @@ -78,10 +80,61 @@ do_rm(char *path, struct xs_handle *xsh, } #endif +#if defined(CLIENT_chmod) +#define PATH_SEP ''/'' +#define MAX_PATH_LEN 256 + +static void +do_chmod(char *path, struct xs_permissions *perms, int nperms, int upto, + int recurse, struct xs_handle *xsh, xs_transaction_t xth) +{ + int ret; + + if (!path[0]) + re...
2013 Nov 25
22
[PATCH 0/4] Coverity fixes for tools/libxl
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> -- 1.7.10.4
2010 Aug 12
0
[PATCH, v2]: xl: Implement per-API-call garbage-collection lifetime
...xl_ctx_init(libxl_ctx *ctx, int v static void do_free_version_info(libxl_version_info *info); int libxl_ctx_free(libxl_ctx *ctx) { - libxl_free_all(ctx); - free(ctx->alloc_ptrs); xc_interface_close(ctx->xch); do_free_version_info(&ctx->version_info); if (ctx->xsh) xs_daemon_close(ctx->xsh); @@ -86,6 +78,7 @@ int libxl_ctx_free(libxl_ctx *ctx) int libxl_domain_make(libxl_ctx *ctx, libxl_domain_create_info *info, uint32_t *domid) { + libxl_gc gc = LIBXL_INIT_GC(ctx); int flags, ret, i, rc; char *uuid_string; cha...
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer address in xenstore across save/restore and migrate, and also code to increment the value in all cases except for migration. The first patch modifies creation of the hvmloader key in xenstore and adds creation of a new read/write hvmloader/generation-id-addr key. The second patch changes hvmloader to use the new key (as
2012 Dec 14
1
[PATCH V5] libxenstore: filter watch events in libxenstore when we unwatch
...s_fileno(). */ h->watch_pipe[0] = h->watch_pipe[1] = -1; + h->unwatch_filter = false; + #ifdef USE_PTHREAD pthread_mutex_init(&h->watch_mutex, NULL); pthread_cond_init(&h->watch_condvar, NULL); @@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags) if (!xsh && !(flags & XS_OPEN_SOCKETONLY)) xsh = get_handle(xs_domain_dev()); + if (xsh && (flags & XS_UNWATCH_FILTER)) + xsh->unwatch_filter = true; + return xsh; } @@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token) ARRAY_...
2012 Nov 07
4
[PATCH 2/2] 4.1.2 blktap2 cleanup fixes.
...th) return; @@ -75,5 +76,11 @@ void libxl__device_destroy_tapdisk(libxl err = tap_ctl_find(type, disk, &tap); if (err < 0) return; + /* + * Remove the instance of the backend device to avoid a deadlock with the + * removal of the tap device. + */ + xs_rm(ctx->xsh, XBT_NULL, be_path); + tap_ctl_destroy(tap.id, tap.minor); } diff -r b184698e0893 tools/libxl/libxl_device.c --- a/tools/libxl/libxl_device.c Tue Nov 06 19:53:48 2012 -0600 +++ b/tools/libxl/libxl_device.c Tue Nov 06 19:54:23 2012 -0600 @@ -250,8 +250,7 @@ int libxl__device_destroy(libxl_ctx...
2012 Dec 14
1
[PATCH V4] libxenstore: filter watch events in libxenstore when we unwatch
...s_fileno(). */ h->watch_pipe[0] = h->watch_pipe[1] = -1; + h->unwatch_filter = false; + #ifdef USE_PTHREAD pthread_mutex_init(&h->watch_mutex, NULL); pthread_cond_init(&h->watch_condvar, NULL); @@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags) if (!xsh && !(flags & XS_OPEN_SOCKETONLY)) xsh = get_handle(xs_domain_dev()); + if (xsh && (flags & XS_UNWATCH_FILTER)) + xsh->unwatch_filter = true; + return xsh; } @@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token) ARRAY_...
2012 Jan 05
1
[PATCH] add feature flag to xenstore for XS_RESET_WATCHES
...iff -r 3a22ed3ec534 -r 2f5a98692acd tools/libxl/libxl_create.c --- a/tools/libxl/libxl_create.c +++ b/tools/libxl/libxl_create.c @@ -434,6 +434,7 @@ retry_transaction: libxl__xs_writev(gc, t, libxl__sprintf(gc, "%s/platform", dom_path), info->platformdata); xs_write(ctx->xsh, t, libxl__sprintf(gc, "%s/control/platform-feature-multiprocessor-suspend", dom_path), "1", 1); + xs_write(ctx->xsh, t, libxl__sprintf(gc, "%s/control/platform-feature-xs_reset_watches", dom_path), "1", 1); if (!xs_transaction_end(ctx->xsh, t,...
2011 Nov 04
2
[PATCH V3 REBASE 1/2] libxl_qmp: Introduce libxl__qmp_pci_del
To remove a pci passthough device from QEMU (upstream). Signed-off-by: Anthony PERARD <anthony.perard@citrix.com> --- tools/libxl/libxl_internal.h | 2 ++ tools/libxl/libxl_qmp.c | 35 +++++++++++++++++++++++++++++++++++ 2 files changed, 37 insertions(+), 0 deletions(-) diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index 1dff211..84da6b1 100644 ---
2014 May 20
3
Setting mail location in SQL?
Trying to figure out the syntax to set a mail_location for SQL. This doesn't work: userdb { driver = sql args = /etc/dovecot/master-combined-sql.conf override_fields = mail_location=maildir:/fakedir/%d/%n:INBOX=/fakedir:LAYOUT=fs } Does anyone know the proper syntax? Thanks in advance
2013 May 13
11
[PATCH] Fix QEMU HVM hotplug race in QEMU traditional (Xen 4.1, Xen 4.2, and Xen 4.3) (v1).
Hey Ian and Stefano, Please see this thread: http://lists.xen.org/archives/html/xen-devel/2013-05/msg01053.html for the debug patches and some of the discussion. These three patches fix an race that has been in QEMU traditional for a long time. The guts of the bug is that if you have a guest with these options: vcpus=1 maxvcpus=32 and do ''xl vcpu-set <guest> 32'' the
2012 Dec 13
4
[PATCH V3] libxenstore: filter watch events in libxenstore when we unwatch
...xs_fileno(). */ h->watch_pipe[0] = h->watch_pipe[1] = -1; + h->unwatch_safe = false; + #ifdef USE_PTHREAD pthread_mutex_init(&h->watch_mutex, NULL); pthread_cond_init(&h->watch_condvar, NULL); @@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags) if (!xsh && !(flags & XS_OPEN_SOCKETONLY)) xsh = get_handle(xs_domain_dev()); + if (xsh && (flags & XS_UNWATCH_SAFE)) + xsh->unwatch_safe = true; + return xsh; } @@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token) ARRAY_SIZE...
2009 Nov 18
6
[PATCH 1/3] libxenlight: Clean up logging arrangements
...91 +++++++++++++++++++++++------------------ tools/libxl/libxl_device.c | 27 +++++++++---- tools/libxl/libxl_dom.c | 11 +++-- tools/libxl/libxl_exec.c | 2 +- tools/libxl/libxl_internal.c | 39 +++++++++++++++--- tools/libxl/libxl_internal.h | 11 ++++- tools/libxl/libxl_xshelp.c | 5 ++ 7 files changed, 124 insertions(+), 62 deletions(-) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c index 69690e4..5e2f23b 100644 --- a/tools/libxl/libxl.c +++ b/tools/libxl/libxl.c @@ -106,14 +106,17 @@ int libxl_domain_make(struct libxl_ctx *ctx, libxl_domain_create_info...
2003 Sep 24
1
Problem using C random generator called from R
Hello I'm trying to use C random generator function drand48() which return floating-point values, uniformly distributed over [0,1], (http://www.opengroup.org/onlinepubs/007908799/xsh/drand48.html). When values are returned to R, they are not in [0,1]. A simple C program using drand48() gives values in [0,1] so I suppose there is a problem (type definition ?) between C and R. Here are R and C function and an example. # R function simulC <- function(n) { dyn.load("...
2020 Sep 13
2
Invalid transformation in LibCallSimplifier::replacePowWithSqrt?
...t of +Inf (indicating an exact result for the operation and, since IEEE Std 754-2008 subclause 9.1.1 states that domain errors are to be indicated by a NaN result, a lack of a domain error). It is noted that the above statements were made notwithstanding the ERRORS section of pow() in POSIX.1-2017 XSH Chapter 3, which specifies a domain error except perhaps by deference to the C standard due to a conflict between the POSIX and the C wording. The transformation in question causes EDOM for pow(-Inf, 0.5) even on platforms where the system library implementation of pow does not cause this situati...